Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Senator Mark Warner has called for a federal investigation of credit rating agency Equifax after the company lost the personal data of 143 million customers to hackers. [Read More]
CEO Eugene Kaspersky will testify before Congress regarding the use of Kaspersky products by the U.S. government [Read More]
The Federal Trade Commission said it has begun an investigation into a massive data breach at credit bureau Equifax that may have leaked sensitive information on 143 million people. [Read More]
Equifax confirms that an Apache Struts vulnerability exploited in the wild since March has been used to breach its systems [Read More]
A class action lawsuit by Canadian consumers whose data was stolen in a massive hack of US credit bureau Equifax was launched, seeking damages of Can $550 billion ($450 billion US). [Read More]
Apache Struts 2 vulnerability reportedly exploited to hack Equifax and gain access to customer data [Read More]
The Equifax breach could be the worst-ever data breach for American consumers, exposing some of the most sensitive data for a vast number of US households. [Read More]
Industry professionals comment on the Equifax hack, which may affect as many as 143 million people [Read More]
Equifax said hackers accessed its system in a colossal breach that could affect nearly half the US population as well as people in Britain and Canada. [Read More]
Lenovo settles FTC charges over the Superfish adware shipped with many of its laptops, but the company will not pay a fine [Read More]

FEATURES, INSIGHTS // Incident Response

rss icon

Josh Lefkowitz's picture
Regardless of the extent to which your organization shares information, there’s a lot we can all learn from the WireX botnet takedown.
Adam Meyer's picture
Want to hire the best analyst? Then first define what is usable and then focus your search on those characteristics.
Marc Solomon's picture
To more effectively prioritize to ensure relevance of threat intelligence, humans must be involved. After all, who understands your environment better than you?
Danelle Au's picture
How do you decide where to focus your security efforts to break the kill chain? Let’s take a look at three different approaches.
Marc Solomon's picture
Automatically recalculating and reevaluating priorities and threat assessments ensures you continue to stay focused on what is relevant to mitigate your organization’s risk.
Adam Meyer's picture
With sound and timely operational threat intelligence, you can make life a lot harder for adversaries and have a much better understanding of how your organization is positioned against today's cyber threats.
Joshua Goldfarb's picture
All the activity around the WannaCry ransomware attack really did make me want to cry. But not for the reasons you might expect. So what was it that nearly brought me to tears?
Marc Solomon's picture
Threat intelligence integration done right will allow you to act on threat intelligence efficiently and effectively using your existing security tools and services.
Rafal Los's picture
Don’t overlook the importance of having something that’s repeatable. To be repeatable, a process must be well-documented, well-understood and well-practiced.
Marc Solomon's picture
To harness the power embedded in disparate sources of threat data requires aggregating it and translating it into a uniform format for analysis and action.